- Web Security Cross-Side Scripting Demystified
- Communication Tips for Submitting a Security Conference Proposal
Getting accepted to speak at a security conference takes more than good research. Targeting the right events, aligning your topic with your expertise, and writing a concise proposal can significantly...
- Assessments Perception of Value in Security Consulting Projects
Clients can't evaluate specialized security work directly, so they estimate value by assessing effort—usually time. A skilled locksmith opening locks in seconds gets fewer tips than when...
- Communication 10 Communication Tips for Security and IT Professionals
Explaining security and IT work is often harder than the work itself. Ten habits will sharpen how you explain it to specialists, executives, and everyone in between.
- Career Stop Relying on Your Resume
A resume gives employers what they need to reject you—designed to make you look like everyone else. If you promise to only use resumes late in the process, you'll motivate yourself to stand out...
- Malware Analysis Several Malware Analysis Reports to Learn From
Learning from other analysts' reports is valuable when you can't reverse-engineer malware yourself. Recommended write-ups cover Murofet (file infection, password stealing), Avzhan (DDoS bots), Visal...